8Shamir A. Identity-based cryptosystems and signature schemes//Blankley G T, Chaum D eds. //Proceedings of the CRYPTO'84. LNCS 196, Springer-Verlag, 1985:48-53.
9Boneh D, Franklin M. Identity-based encryption from the weil pairing//Proceedings of the Cryptology-Crypto 2001. LNCS 2139, Springer-Verlag, 2001:231-229.
10Bellare M, Boldyreva A, Palacio A. An uninstantiable ran- dom-oracle-model scheme for a hybrid-encryption problem// Proceedings of the Cryptology-EUROENCRYPT' 2004. LNCS 3027, Springer-Verlag, 2004:171-188.